Sciweavers

1040 search results - page 157 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
ADHOCNETS
2009
Springer
14 years 3 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
ATAL
2009
Springer
14 years 3 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...
FGIT
2009
Springer
14 years 3 months ago
AGILE Rate Control for IEEE 802.11 Networks
We present a transmission rate adaptation algorithm called AGILE (ACK-Guided Immediate Link rate Estimation) for IEEE 802.11 networks. The key idea of AGILE is that the transmitter...
Lochan Verma, Seongkwan Kim, Sunghyun Choi, Sung-J...
NOSSDAV
2009
Springer
14 years 3 months ago
Power efficient real-time disk scheduling
Hard-disk drive power consumption reduction methods focus mainly on increasing the amount of time the disk is in standby mode (disk spun down) by implementing aggressive data read...
Damien Le Moal, Donald Molaro, Jorge Campello
SAMT
2009
Springer
135views Multimedia» more  SAMT 2009»
14 years 3 months ago
Exploring Relationships between Annotated Images with the ChainGraph Visualization
Abstract. Understanding relationships and commonalities between digital contents based on metadata is a difficult user task that requires sophisticated presentation forms. In this ...
Steffen Lohmann, Philipp Heim, Lena Tetzlaff, Thom...